Resource Type: AWS > RDS > DB Instance
The DB Instance resource type is a database instance that can be created and managed on the AWS platform. It provides a scalable and secure environment for running and managing databases in the cloud.
Resource Context
DB Instance is a part of the RDS service.
Each DB Instance lives under a Region.
Controls
The primary controls for AWS > RDS > DB Instance are:
- Active
- Approved
- Auto Minor Version Upgrade
- Backup Retention Period
- CMDB
- Configured
- Copy Tags to Snapshot
- Deletion Protection
- Discovery
- Logs Export Configuration
- Multi-AZ
- Parameter Group
- Performance Insights
- Publicly Accessible
- Schedule
- ServiceNow
- Tags
- Usage
It is also targeted by these controls:
- AWS > CIS v1.4 > 2 - Storage > 2.03 - Relational Database Service (RDS) > 2.03.01 - Ensure that encryption is enabled for RDS Instances (Automated)
- AWS > CIS v2.0 > 2 - Storage > 2.03 - Relational Database Service (RDS) > 2.03.01 - Ensure that encryption-at-rest is enabled for RDS Instances
- AWS > CIS v2.0 > 2 - Storage > 2.03 - Relational Database Service (RDS) > 2.03.02 - Ensure Auto Minor Version Upgrade feature is Enabled for RDS Instances
- AWS > CIS v2.0 > 2 - Storage > 2.03 - Relational Database Service (RDS) > 2.03.03 - Ensure that public access is not given to RDS Instance
- AWS > CIS v3.0 > 2 - Storage > 2.03 - Relational Database Service (RDS) > 2.03.01 - Ensure that encryption-at-rest is enabled for RDS Instances
- AWS > CIS v3.0 > 2 - Storage > 2.03 - Relational Database Service (RDS) > 2.03.02 - Ensure Auto Minor Version Upgrade feature is Enabled for RDS Instances
- AWS > CIS v3.0 > 2 - Storage > 2.03 - Relational Database Service (RDS) > 2.03.03 - Ensure that public access is not given to RDS Instance
- AWS > HIPAA > RDS > Database logging should be enabled
- AWS > HIPAA > RDS > RDS DB instance backup should be enabled
- AWS > HIPAA > RDS > RDS DB instance encryption at rest should be enabled
- AWS > HIPAA > RDS > RDS DB instance multiple az should be enabled
- AWS > HIPAA > RDS > RDS DB instance should be protected by backup plan
- AWS > HIPAA > RDS > RDS DB instances should be in a backup plan
- AWS > HIPAA > RDS > RDS DB instances should prohibit public access
- AWS > NIST 800-53 > RDS > Database logging should be enabled
- AWS > NIST 800-53 > RDS > RDS DB instance and cluster enhanced monitoring should be enabled
- AWS > NIST 800-53 > RDS > RDS DB instance backup should be enabled
- AWS > NIST 800-53 > RDS > RDS DB instance encryption at rest should be enabled
- AWS > NIST 800-53 > RDS > RDS DB instance multiple az should be enabled
- AWS > NIST 800-53 > RDS > RDS DB instances should be in a backup plan
- AWS > NIST 800-53 > RDS > RDS DB instances should have deletion protection enabled
- AWS > NIST 800-53 > RDS > RDS DB instances should prohibit public access
- AWS > PCI v3.2.1 > RDS > 2 RDS DB Instances should prohibit public access
Quick Actions
- Disable Auto Minor Versions Upgrade
- Disable Copy Tags To Snapshot
- Disable Deletion Protection
- Disable Multi AZ
- Enable Auto Minor Versions Upgrade
- Enable Copy Tags To Snapshot
- Enable Deletion Protection
- Enable Multi AZ
- Reboot DB Instance
- Set Tags
- Skip alarm for Active control
- Skip alarm for Active control [90 days]
- Skip alarm for Approved control
- Skip alarm for Approved control [90 days]
- Skip alarm for Tags control
- Skip alarm for Tags control [90 days]
- Snapshot and delete from AWS
- Start DB Instance
- Stop DB Instance
Category
In Your Workspace
- Controls by Resource Type report
- Policy Settings by Resource Type report
- Resources by Resource Type report
Developers
- tmod:@turbot/aws-rds#/resource/types/dbInstance
- tmod:@turbot/turbot#/resource/categories/database
- turbot graphql resource --id "tmod:@turbot/aws-rds#/resource/types/dbInstance"
Get Resource- select * from guardrails_resource where resource_type_uri = 'tmod:@turbot/aws-rds#/resource/types/dbInstance';
- select * from guardrails_policy_setting where filter = 'resourceTypeId:"tmod:@turbot/aws-rds#/resource/types/dbInstance"';
- select * from guardrails_notification where resource_type_uri = 'tmod:@turbot/aws-rds#/resource/types/dbInstance' and notification_type in ('resource_updated', 'resource_created');
Get ResourceGet Policy Settings (By Resource ID)Get Resource Notification
Resource Type URI
Category URI
GraphQL
CLI
Steampipe Query